Suped

Summary

Including a plaintext version alongside your HTML email is a widely accepted best practice for accessibility and compliance (like ADA). However, some marketers have observed an unexpected side effect: an increase in bot activity, particularly clicks, seemingly originating from the plaintext part of the email. This phenomenon often points to the sophisticated nature of corporate email security filters and how they process various email formats.

What email marketers say

Email marketers often focus on optimizing HTML email design and content, but the plaintext version remains a critical, albeit less visually engaging, component. The observation that including plaintext might increase bot activity introduces a dilemma, as plaintext is a deliverability best practice. Marketers express concern over skewed metrics and the practical implications for campaign analysis when bot interactions interfere with legitimate engagement data.

Marketer view

Marketer from Email Geeks shared their observation: an A/B test showed an increase in bot activity when including plaintext versions of emails. This was particularly puzzling given that plaintext is considered a best practice for accessibility and ADA compliance, especially with a subscriber base of corporate Outlook users.

18 Feb 2021 - Email Geeks

Marketer view

Marketer from Email Geeks noted that the bot activity appeared to be clicking links exclusively within the plaintext portion of the email, leading to questions about why this specific format would trigger such interactions.

18 Feb 2021 - Email Geeks

What the experts say

Email experts attribute increased bot activity in plaintext emails to the stringent security measures employed by modern mail systems, especially in corporate environments. These systems are designed to aggressively scan all parts of an email, including the plaintext version, for malicious content and suspicious links. The presence of additional links in the plaintext part can provide more opportunities for these automated scanners to interact with the email, leading to a perceived surge in bot clicks.

Expert view

Expert from Email Geeks suggests that corporate malware filters are likely the cause of increased bot activity. They follow links if they seem dubious based on their heuristics, making it a complex and mailstream-specific issue.

18 Feb 2021 - Email Geeks

Expert view

Expert from Email Geeks speculates that if links are present in both plaintext and rich text versions, it effectively doubles the number of links available for automated systems to scan, potentially increasing bot clicks.

18 Feb 2021 - Email Geeks

What the documentation says

Official documentation and technical standards underscore the necessity of robust email security, which inherently involves comprehensive scanning of all email components. While standards like MIME define how different parts of an email (like HTML and plaintext) should be rendered by clients, security systems interpret and process these parts for threat detection. This often means that even the plaintext version, despite its simplicity, undergoes rigorous automated analysis, including link validation.

Technical article

Documentation from RFC 2046, which defines MIME media types, specifies that a multipart/alternative email containing both HTML and plaintext versions should be rendered by the client choosing the 'richest' format it can display. However, it implicitly acknowledges that other systems (like security scanners) may process all parts regardless of rendering choice.

15 Nov 1996 - RFC 2046

Technical article

Documentation from Microsoft Defender for Office 365 outlines that email filtering mechanisms include URL detonation and safe links features. These features actively scan all links in an email, including those in plain text, to protect against phishing and malware threats.

20 Aug 2023 - Microsoft Defender Documentation

5 resources

Start improving your email deliverability today

Get started